Penetration Testing with Live Malware

Today’s perimeter defenses typically incorporate multiple layers of anti-malware technology – none of which are verified during the regular cycle of penetration testing. These defenses are a critical barrier to safeguard breaches, yet are known to fail on a daily basis. This session explores why these defenses are failing and how they should be evaluated during a penetration test.